Features

Keep corporate data off the device

We call it security-by-absence. Since one cannot trust the device to implement security (think jailbreak/rooting), we do our best not to store any data on the device.

LetMobile allows users to view emails and documents, but not to save them to the device where control would be lost, nor to cut-and-paste information from them

If you instruct us to allow some users to store data for offline use, we will encrypt it, and the key will not be kept on the device

Powerful, real-time, fine-grained access control policy

Every piece of information consumed from a mobile device goes through our gateway, and is screened for corporate policies and regulatory compliance.

Like other solutions, we check for credentials. But we also allow you to enforce context-based policies based on a number of parameters such as the location of the device (e.g., EU compliance), policies based on the level of security of the device itself and the network from which it connects, etc.

Our real-time enforcement means that each view is subject to policy. No sensitive information crossing wrong borders. No need to wipe devices of departing employees.

Blocking or masking sensitive content

Access to some information from mobile devices should be restricted due to sensitivity, or to comply with certain regulatory requirements.